Results 161 to 170 of about 154,141 (333)
Robust Multi-property Combiners for Hash Functions Revisited [PDF]
Marc Fischlin +2 more
openalex +1 more source
Tiivistelmä Viime vuosina digitaaliseen tiedonsiirtoon perustuva tiedonsiirto on yleistynyt valtavasti. Tästä on seurannut monia uusia tietoturvaongelmia. Tässä yhteydessä erityisesti tiedon suojaamiseen käytetyt kryptografiset menetelmät ovat olleet tarkastelun kohteena.
openaire +1 more source
Attacks on hash functions and applications
Cryptografische hashfuncties, of simpelweg hashfuncties, zijn een van de belangrijkste bouwstenen binnen de cryptografie. Een hashfunctie is een algoritme dat voor elk willekeurig bericht een korte hash-waarde van een vast aantal bits (bv. 256 bits) berekent. Zulke hash-waarden worden gebruikt als een soort van vingerafdruk om het originele bericht mee
openaire +4 more sources
Summary Introduction Demand for surgical treatment is growing and patient complexity is increasing. The NHS England standard contract now requires that pre‐operative services risk stratify and optimise patients awaiting surgery. However, current pre‐operative workflows (whether electronic or paper‐based) remain based primarily on resource‐intensive ...
Alwyn Kotzé +7 more
wiley +1 more source
ANALYSIS OF IMPLEMENTATIONS OF THE CRYPTOGRAPHIC HASH FUNCTION SHA-1 BASED ON PIPELINE CIRCUITS
An analysis of hardware implementations of the cryptographic hash function SHA-1 based on pipeline circuits with different numbers of logic levels was made in this paper.
E. V. Listopad
doaj
Controlled Alternate Quantum Walks based Quantum Hash Function. [PDF]
Li D, Yang YG, Bi JL, Yuan JB, Xu J.
europepmc +1 more source
Hash functions for near duplicate image retrieval [PDF]
Adrien Auclair +2 more
openalex +1 more source
Abstract Background Myocyte enhancer factor 2 transcription factors regulate essential transcriptional programs in various cell types. The activity of myocyte enhancer factor 2 factors is modulated through interactions with cofactors, chromatin remodelers, and other regulatory proteins, which are dependent on cell context and physiological state.
Karine de Mattos +4 more
wiley +1 more source
Novel Duplicate Address Detection with Hash Function. [PDF]
Song G, Ji Z.
europepmc +1 more source

